What is E-Government?
It is the use of information and communication technologies (ICTs) to improve the activities of public sector organisations
Tell cybersecurity types
Network security, Application security, Information security, Operational security
This term refers to the smallest unit of Bitcoin, named after its mysterious creator.
Satoshi Nakamoto
Autonomous software that can make financial decisions
What is smart contract?
How many types of Cloud Deployment?
3
What are the five pillars of digital economy framework?
Digital infrastructure
Digital skills
Innovation
Digital trade
Cybersecurity
What kind of information is considered a digital security risk?
Personal Identification Data
Personal Payment Data
Personal Health Data
This process, fundamental to Bitcoin and many other cryptocurrencies, involves solving complex mathematical puzzles to validate transactions and add them to the blockchain.
Mining
Confidential information is available to trusted members
What is Private blockchains
_______ refers to large, complex datasets that require advanced tools and methods to store, process, and analyze.
Find the word under __ this.
Big Data
What is Smart Factory?
Smart Factory is a highly automated and digitally connected manufacturing facility that uses advanced technologies such as the Internet of Things (IoT), Artificial Intelligence (AI), Big Data, and Robotics to optimize production processes. It is a key component of Industry 4.0, enabling real-time monitoring, self-optimization, and predictive maintenance in manufacturing.
The difference between digital security and cybersecurity
Digital security involves protecting your online presence (data, identity), while cybersecurity covers more ground, protecting entire network, computer systems, and other digital components
What is the main job of crypto mining?
To verify transactions and keep the blockchain safe
takes many hashes and squeeze them down into one hash
What is the Merkle Tree
This type of cloud architecture combines private and public cloud environments, allowing data and applications to move between them seamlessly.
Hybrid cloud computing
To build a digital country we need to set following strategies
Digital competence, digital security, digital innovation, digital infrastructure, digital leadership and governance
What is a decentralized security approach that allows organizations to secure assets, devices, and users regardless of location. Instead of relying on a single security perimeter, cybersecurity mesh enables different security tools to work together as an integrated ecosystem.
Cybersecurity mesh
how many transactions per second can bitcoin do?
7 transactions per second
Self-policing; Self-correcting; Storing data
What is blockchain
What does PaaS stand for?
Platform as a Service
What functions is software developer responsible for
A software developer is responsible for designing, building, testing, and maintaining software applications
What is ransomware attack?
A ransomware attack is a type of cyberattack in which hackers use malicious software (ransomware) to encrypt a victim’s files or systems, making them inaccessible
What is a consensus mechanism, used by Bitcoin, requires miners to solve complex mathematical problems to validate transactions and secure the network.
Proof of Work
provide a link between the outside world (real world information) and the smart contract in blockchain so it can execute.
What are Oracles
What is it?
... refers to large, complex datasets that require advanced tools and methods to store, process, and analyze.
Big data